• Home
  • About Rimag
  • Contact Us
  • Register
  • Log in
  • Order
Advanced
  • Home
  • امنیت
    • List of Articles امنیت

      • Open Access Article
        • Abstract Page
        • Full-Text

        1 - Content rating a nessissity for spam management in social networks
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        2 - Content rating for spam management in social networks a nessissity
        Simin Ghesmati
      • Open Access Article
        • Abstract Page
        • Full-Text

        3 - A Novel Model for detecting intrusion with Mobile Agent and Game theory
        Amin Nezarat mehdi raja Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        4 - An Approach to Agent- dependent Replicated in Fault-Tolerant Mobile Code Execution
        Hodjat Hamidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        5 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        6 - IT Services Outsourcing Novation tactics and Entrepreneurial Strategies in the Financial Services (Case Study: Private and public banks in Markazi province)
        mahtab Eshghiaraghi
      • Open Access Article
        • Abstract Page
        • Full-Text

        7 - Presenting a model for using mobile agents in distributed intrusion detection systems based on game theory
        امین نظارات مهدی رجا Gholamhossein Dastghaibyfard
      • Open Access Article
        • Abstract Page
        • Full-Text

        8 - Analysis of the Social Pathology Due old Texture Dugonbadan City in Using the Security Approach (Gachsaran Town ship)
        Mohammad Hasel nejad Ali Shamsoddini Mohammad Reza Rezaei
      • Open Access Article
        • Abstract Page
        • Full-Text

        9 - Geopolitical Analysis of Spatial Planinng View in Afghanistan and Providing Strategic Model
        Atiqullah Ghamari Qiuomars Yazdanpanah Dero Zahra Pishgahi fard Hossein Hataminejad
      • Open Access Article
        • Abstract Page
        • Full-Text

        10 - Survey of environmental impacts of security policies of Israel (From theory to practice)
          hassan kamran
      • Open Access Article
        • Abstract Page
        • Full-Text

        11 - Environmental security and national security in the context of cross-border hydropolitics developments (Case Study: Harirud)
        hassan kamran    
      • Open Access Article
        • Abstract Page
        • Full-Text

        12 - Evaluation of social housing and the effective factors in housing provision for low income classes(a case study :Eslamshahr)
        محسن  سقایی Ahmad mozeni amir sanaeirad
      • Open Access Article
        • Abstract Page
        • Full-Text

        13 - Investigation of environmental factors affecting the occurrence of urban crime (crime of theft) - Case study: District 1 and 7 of Qom-
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        14 - Investigating the Impact of Defenseless Spaces on Citizen Safety sense (Case Study: Tehran Bazar Neighborhood)
        Hossein Farhadikhah Ahmad Pourahmad   Seyed Khalil Seyed Alipour
      • Open Access Article
        • Abstract Page
        • Full-Text

        15 - Passive defense, the secret of security in the range of of urbans and rurals country (With emphasis on rural and urban architecture)
        Nasr Allah Fallah tabar  
      • Open Access Article
        • Abstract Page
        • Full-Text

        16 - Caspian Sea geopolitical crises emphasizing the geo-economics’ competition between coastal countries and its impact on Iran's national security
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        17 - The Elements and the Processes Influencing International System
        Reza سیمبر ارسلان  قربانی شیخ‌نشین
      • Open Access Article
        • Abstract Page
        • Full-Text

        18 - Studying the Relationship between Racial Integration (Kurds &Turks) and Stable Security; Recognition of Effective Factors on Integrating the Races in West Azarbayejan
        شفیع  بهرامیان امید  بهرامیان
      • Open Access Article
        • Abstract Page
        • Full-Text

        19 - Arabic Revolutions and Shaping New Security Orders In Middle East
        فاطمه  قیاسوندی نبی‌الله  ابراهیمی Ahmad سلطانی‌نژاد
      • Open Access Article
        • Abstract Page
        • Full-Text

        20 - Relation of Bio-Politics to Global Discourses; Liberalism, Totalitarianism, and Security
        Fateh  Moradi Abasali  Rahbar
      • Open Access Article
        • Abstract Page
        • Full-Text

        21 - An access control model for online social networks using user-to-user relationships
        Mohamad Javad Piran mahmud deypir
      • Open Access Article
        • Abstract Page
        • Full-Text

        22 - Proposing a New Framework to Decreasing Delay in the Internet of Things by Using Computing Power of Fog
        Mohammad Taghi Shaykhan kianoosh azadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        23 - Analyzing the Capacity of Islamic Ethics in the Protest Movement of the Palestinian Jihadists on the Israeli National Security Doctrine
             
      • Open Access Article
        • Abstract Page
        • Full-Text

        24 - Security Policy Analysis in the Light of Human Rights
        Eslam Mondani Mohammad Ashouri
      • Open Access Article
        • Abstract Page
        • Full-Text

        25 - A moral look at chapteristic sanctions regarding the legal implications of this, Bernslett II Human Rights
        حسین  اخوان Seyyed Bagher Mirabassi Abo-Mohammad Asgarkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        26 - The Importance and Position of Principal Organs of United Nations Organization in the Framework of United Nations Charter
        Saeedeh  Golkar Seyyed Mohammad Hashemi
      • Open Access Article
        • Abstract Page
        • Full-Text

        27 - A moral and legal look at the nuclear risks to global peace and security
        Ali  Bagheri Mahmud Abadi Amir Maghami Alireza  Arashpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        28 - Indicators of Mahdavi's rule of peace and security
        Ehsan  Samani
      • Open Access Article
        • Abstract Page
        • Full-Text

        29 - Membership in social network son the level of identification and social security adolescents
        Abbas Ali  Shahidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        30 - Tawhid in the view points of Salafi Jihadi and studying it's consequences
        abbasali farzandi
      • Open Access Article
        • Abstract Page
        • Full-Text

        31 - Information Security Maturity Assessment Model in the IT Departments of the Oil Industry Subsidiaries in Iran
        Reza Radfar Fatemeh akhavan
        10.52547/jstpi.20788.16.64.41
      • Open Access Article
        • Abstract Page
        • Full-Text

        32 - Iran's penal policy towards providing security for children in cyberspace
        Seyed Abbas Khalilpour Chalkiasari
      • Open Access Article
        • Abstract Page
        • Full-Text

        33 - A Causal Explanation of Social Safeness Based on Neuroticism: The mediating Role of Basic Psychological Needs Satisfaction and Frustration
        Hamid Barani Mohsen Arbezi Mahboubeh Fouladchang
      • Open Access Article
        • Abstract Page
        • Full-Text

        34 - Anthropological Principles of Hobbes and Spinoza on Government (A Historical Overview)
        Bayan Karimy Seyyed Mustafa  Shahraeini
      • Open Access Article
        • Abstract Page
        • Full-Text

        35 - Model Designing of Total Softpower Policy the Islamic Republic of Iran
        Mohammad Taqi  Amini Mohammad MahmoodiMeymand MohamadMehdi Parhizgar محمد رضا  مشایخ
      • Open Access Article
        • Abstract Page
        • Full-Text

        36 - ارائه الگوی راهبردی توسعه امنیت ساختمان‌ها در برابر زلزله
          Soheila Bourghani Farahani
      • Open Access Article
        • Abstract Page
        • Full-Text

        37 - Examining solutions to deal with the shortage of cyberspace security experts in the country
        Mohammad fathian Mehdi Abolhamid mohammadreza rafeei
      • Open Access Article
        • Abstract Page
        • Full-Text

        38 - طراحی مجدد شبکه و برنامه¬ریزی زنجیره تأمین محصولات غذایی با لحاظ کردن امنیت غذایی و جریان¬های مالی
          mir saman pishvaee
      • Open Access Article
        • Abstract Page
        • Full-Text

        39 - Simultaneous Implementation of Time of Use Demand Response and Security Constraint Unit Commitment
        M. Kia M. Setayesh-Nazar S. M. Sepasian
      • Open Access Article
        • Abstract Page
        • Full-Text

        40 - Evaluation of Performance, Reliability and Security for Share-Data, Object-Oriented and Pipe and Filter Styles
        H. Banki H. Banki
      • Open Access Article
        • Abstract Page
        • Full-Text

        41 - Economic Load Dispatch in Power Plants, Taking into Account Environmental Pollutants and System Security Indices Using Multi-Objective Harmony Search Algorithm
        H. Sharifi محمود اوکاتی صادق
      • Open Access Article
        • Abstract Page
        • Full-Text

        42 - Coordinated Expansion Planning of Gas and Electricity Networks Considering N-1 Security Criterion
        V. Khaligh M. Oloomi Buygi
      • Open Access Article
        • Abstract Page
        • Full-Text

        43 - A Patient Identification and Authentication Protocol to Increase Security
        Afsaneh Sharafi Sepideh Adabi Ali Movaghar Salah Al-Majed
      • Open Access Article
        • Abstract Page
        • Full-Text

        44 - Identification of Organizational Capital and Its Evaluation in Covid-19 Conditions
        hajieh rajabi farjad
        10.61186/jstpi.31810.20.78.28
      • Open Access Article
        • Abstract Page
        • Full-Text

        45 - Social justice and its role in social security from the perspective of the Qur'an and Islamic traditions
        Mohsen Ghafoury pour seed hamid shamerizi Kamal  Khajehpour
      • Open Access Article
        • Abstract Page
        • Full-Text

        46 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
        Mohammad Soltani Hassan Shakeri Mahboobeh Houshmand
      • Open Access Article
        • Abstract Page
        • Full-Text

        47 - Secure Computing on the Internet of Everything
        Seyed Omid Azarkasb Seyed Hossein Khasteh
      • Open Access Article
        • Abstract Page
        • Full-Text

        48 - SQ-PUF: A Resistant PUF-Based Authentication Protocol against Machine-Learning Attack
        Abolfazl Sajadi Bijan Alizadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        49 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        10.61186/jstpi.34504.19.76.1
      • Open Access Article
        • Abstract Page
        • Full-Text

        50 - بررسی احساس امنیت گردشگران مذهبی در اماکن فراغتی (مورد مطالعه : شهر مشهد)
           
      • Open Access Article
        • Abstract Page
        • Full-Text

        51 - A Cyber Security Maturity Model for Critical Infrastructures with a Comparative Study Approach
        Mohamad Akhtari mohammadali keramati seyed abdolah amin mousavi
        10.61186/jstpi.36349.19.75.22
      • Open Access Article
        • Abstract Page
        • Full-Text

        52 - A New Parallel Method to Verify the Packets Forwarding in SDN Networks
        Rozbeh Beglari Hakem Beitollahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        53 - Multilateral Export Control Regimes: a Legal Mechanism or Tool of Political Pressure?
        غلامحسین   دهقانی فاطمه  هاشمی
      • Open Access Article
        • Abstract Page
        • Full-Text

        54 - The Role of International Organizations in the Realization of the Right to Food
        Farhad Talaie علی رزمخواه
      • Open Access Article
        • Abstract Page
        • Full-Text

        55 - Comparative Study of UNSC’s Performance vis-à-vis Developments in Libya, Yemen and Bahrain (2011-12) from Viewpoint of International Law
        رضا  موسی‌زاده رضا  رنجبر
      • Open Access Article
        • Abstract Page
        • Full-Text

        56 - Iran's Energy Geopolitics and EU’s Approach
        سیدشمس‌الدین  صادقی
      • Open Access Article
        • Abstract Page
        • Full-Text

        57 - Necessity and Possibility of Judicial Supervision over Security Council’s Performance in UN Legal System
        حسین شریفی طرازکوهی ساسان  مدرس سبزواری
      • Open Access Article
        • Abstract Page
        • Full-Text

        58 - Challenges Facing Security and Defense Policies of EU and US
        سعید  خالوزاده
      • Open Access Article
        • Abstract Page
        • Full-Text

        59 - Impact of Cooperation and Competition of Shanghai’s Members on its Goals and Performance: 2001- 2013
        reza simbar مهدی  هدایتی شهیدانی
      • Open Access Article
        • Abstract Page
        • Full-Text

        60 - ANZUS Treaty: Past and Future
        Nasrin Mosaffa Ahmad Heidarbeigi
      • Open Access Article
        • Abstract Page
        • Full-Text

        61 - The Necessity of Power Sharing in the Security Council: A Pluralistic Model
        Enayatollah Yazadani Enayatollah Yazadani
      • Open Access Article
        • Abstract Page
        • Full-Text

        62 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        63 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        64 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        65 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Yasser Nooralivand Mohammad Reza Majidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        66 - Hidden Veto and Its Impact on Decision-Making Process in the Security Council
        رضا  موسی‌زاده Arsalan Jamshidi
      • Open Access Article
        • Abstract Page
        • Full-Text

        67 - The Status of OIC Member States in the Main Organs of the United Nations
        ستار عزیزی
      • Open Access Article
        • Abstract Page
        • Full-Text

        68 - An Analysis of the Political-Security Integration of the European Union within the Framework of Realist Approaches
        Seyed Davood Aghaee Yasser Nooralivand Ebrahim Bagheri
      • Open Access Article
        • Abstract Page
        • Full-Text

        69 - Prerequisites for the Introduction of Regional Arrangements to Maintain International Peace and Security
        علی احدی کرنق Mehdi Hadadi
      • Open Access Article
        • Abstract Page
        • Full-Text

        70 - Advance on the European Common Foreign and Security Policy, from Kosovo to Ukraine
        Yousef Molaei Issa  Adeli
      • Open Access Article
        • Abstract Page
        • Full-Text

        71 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        72 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        73 - The place of UN Security Council sanctions resolutions in the US sanctions strategy (2018-2020)
        Mahdi Pakzat Saeed Daghineh
      • Open Access Article
        • Abstract Page
        • Full-Text

        74 - COVID-19 and United Nations Peacekeeping Forces: New Challenges piled on Old Constraints
        Nasrin Mosaffa
      • Open Access Article
        • Abstract Page
        • Full-Text

        75 - The Legitimacy of State’s Evaluation in Implementation of United Nations Security Council
        Malihe  Behfar Hassan   Savari
      • Open Access Article
        • Abstract Page
        • Full-Text

        76 - Primacy in Relation Between the International Court of Justice and UN Security Council
        همایون  مافی وحید بذّار
      • Open Access Article
        • Abstract Page
        • Full-Text

        77 - A New Structure for UN Security Council; The Need of Hegemony of Power
        Siamak Soltani Saleh  Rezaie Pishrobat
      • Open Access Article
        • Abstract Page
        • Full-Text

        78 - EU’s Common Foreign and Security Policy: Challenges and Obstacles
        Mohammad Reza Majidi Yasser Nooralivand
      • Open Access Article
        • Abstract Page
        • Full-Text

        79 - China's Foreign Policy and the Evolution of its Security Council Voting Behavior
        Hamid salehi Emad Aslani Minareh Bazaari
      • Open Access Article
        • Abstract Page
        • Full-Text

        80 - The Role of the UN Security Council in Adopting Resolutions Against ISIS
        ehsan jafari far Reza nasirihamed
      • Open Access Article
        • Abstract Page
        • Full-Text

        81 - Human Security and Human Rights; Distinctions and Overlapping Areas
        Naser khorshidi sarem shiravand
      • Open Access Article
        • Abstract Page
        • Full-Text

        82 - Assessing the Role of South and Southeast Asian Regional Organizations in Confronting Maritime Terrorism: Case Study of SAARC, BIMSTEC & ASEAN
        Farhad Talaie Maral Javidbakht
      • Open Access Article
        • Abstract Page
        • Full-Text

        83 - Social welfare and its relationship with social capital and sense of security
        milad abdi
      • Open Access Article
        • Abstract Page
        • Full-Text

        84 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
      • Open Access Article
        • Abstract Page
        • Full-Text

        85 - Machine Learning-Based Security Resource Allocation for Defending against Attacks in the Internet of Things
        Nasim Navaei Vesal Hakami
      • Open Access Article
        • Abstract Page
        • Full-Text

        86 - Designing a Secure Consensus Algorithm for Use in Blockchain
        Hosein Badri Masumeh Safkhani
      • Open Access Article
        • Abstract Page
        • Full-Text

        87 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        88 - Investigating the impact of climate change on the environment and agriculture
        Bahareh Rafiei Hamed Kioumarsi Reza Naseri Harsini Seyed Mohammad Reza Mahdavian
      • Open Access Article
        • Abstract Page
        • Full-Text

        89 - Analysis of Ethical Principles of Disciplinary and Educational Responses to Juvenile Delinquency from the Perspective of Islamic Criminal Law
        roh allah ebrahimi mohamad ali haji deh abadi ALIREZA HOSSINI
      • Open Access Article
        • Abstract Page
        • Full-Text

        90 - The effects of the emergence of security-oriented criminalization in crimes against security in Iranian criminal law
        Hossein  Rezaei Todeshki Seyyed Mahmoud Majidi mohammad javad baghi zadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        91 - A Novel Approach based on Chaotic Mapping for Implementing Security Phases on Cloud Computing
        Azita Rezaei Ali Broumandnia Seyed Javad Mirabedini
      • Open Access Article
        • Abstract Page
        • Full-Text

        92 - Explaining the discourse of thoughts, opinions and statements of Imam Khamenei regarding the role of food security in the resistance economy
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        93 - Providing a Blockchain-Based Method to Protect Users’ Privacy in Social Networks
        Ibrahim Zamani Babgohari Monireh Hosseini
      • Open Access Article
        • Abstract Page
        • Full-Text

        94 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei Mohammad Yousefi Joybari
      • Open Access Article
        • Abstract Page
        • Full-Text

        95 - Human dignity and weapons of mass destruction
        Mohosen Reza  Mosaddegh,khah Morteza  Bayat Hasan Soleimani
      • Open Access Article
        • Abstract Page
        • Full-Text

        96 - Identify and analyze regional security approaches and policies in the Caucasus
        Amir Asadzadeh Mohammad Yousefi Joybari صمد  ظهیری Mohammad Ghorbani Gholshanabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        97 - The role of food security in a resistance economy with emphasis on the thoughts, opinions and statements of the Supreme Leader Mohammad Bidgoli
        Mohammad Bidgoli asghar Rajabi Deh Borzoei
      • Open Access Article
        • Abstract Page
        • Full-Text

        98 - Provide A Lightweight Encryption Solution To secure Data In The Internet Of Things
        wahab aminiazar rasoul farahi fattameh dashti
      • Open Access Article
        • Abstract Page
        • Full-Text

        99 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
      • Open Access Article
        • Abstract Page
        • Full-Text

        100 - Investigation and effects of regional developments on the security of Iran and Turkey borders
        Mahdi Najafi Jalil nayebian Parviz Ahadei  
      • Open Access Article
        • Abstract Page
        • Full-Text

        101 - Explaining the Relationship Between the Sense of Security and Abnormality: A Case Study of Khorramshahr Citizens
        Ebrahim Mirzaei Abouzar Kaseminezhad javad jehangirzadeh
      • Open Access Article
        • Abstract Page
        • Full-Text

        102 - Factors Influencing Women's Empowerment to Ensure Psychological Security of the Family
        Samaneh Ghandehary
      • Open Access Article
        • Abstract Page
        • Full-Text

        103 - Sports law of children with a view on domestic laws, documents and international treaties
        ahmad mohammadvali
      • Open Access Article
        • Abstract Page
        • Full-Text

        104 - Consumer Culture Analysis and Modern Attractions: Influential Factors on Women's Strolling Behavior in Commercial Spaces
        Alireza Pahlavan Keyvan Ahzan Mahdi Fallahi
      • Open Access Article
        • Abstract Page
        • Full-Text

        105 - Identify and Analyze Regional Security Approaches and Policies in the Caucasus
        Amir Asadzadeh Mohammad Yousefi Joybari صمد ظهیری آغجه دیزج Mohammad Ghorbani Gholshanabad
      • Open Access Article
        • Abstract Page
        • Full-Text

        106 - Ethical conflicts of judicial supervision of the International Court of Justice on the legitimacy of Security Council resolutions
        mohammadmehdi seyednaseri Babak  Vosoughifard mosa mosavi Zenos
  • Home Page
  • Site Map
  • Contact Us
  • Home
  • Site Map
  • Regional Science and Technology Information Center
  • Contact Us

The rights to this website are owned by the Raimag Press Management System.
Copyright © 2017-2025

Home| Login| About Rimag| Contact Us|
[فارسی] [العربية] [fa] [ar]
  • Ricest
  • Login
  • email